Descript |
1 online resource (xiv, 373 pages) : illustrations |
Content |
text txt |
Media |
computer c |
Carrier |
online resource cr |
Descript |
text file PDF rda |
Contents |
Introduction to ciphers and substitution. Alice and Bob and Carl and Julius: terminology and Caesar Cipher ; The key to the matter: generalizing the Caesar Cipher ; Multiplicative ciphers ; Affine ciphers ; Attack at dawn: cryptanalysis of sample substitution ciphers ; Just to get up that hill: polygraphic substitution ciphers ; Known-plaintext attacks ; Looking forward -- Polyalphabetic substitution ciphers. Homophonic ciphers ; Coincidence or conspiracy? ; Alberti ciphers ; It's hip to be square: Tabula Recta or Vigenère Square ciphers ; How many is many? ; Determining the number of alphabets ; Superman is staying for dinner: superimposition and reduction ; Products of polyalphabetic ciphers ; Pinwheel machines and rotor machines ; Looking forward -- Transposition ciphers. This is Sparta! The Scytale ; Rails and routes: geometric transposition ciphers ; Permutations and permutation ciphers ; Permutation products ; Keyed columnar transposition ciphers ; Determining the width of the rectangle ; Anagramming ; Looking forward -- Ciphers and computers. Bringing home the bacon: polyliteral ciphers and binary numerals ; Fractionating ciphers ; How to design a digital cipher: SP-networks and feistel networks ; The data encryption standard ; The advanced encryption standard ; Looking forward -- Stream ciphers. Running-key ciphers ; One-time pads ; Baby you can drive my car: autokey ciphers ; Linear feedback shift registers ; Adding nonlinearity to LFSRs ; Looking forward -- Ciphers involving exponentiation. Encrypting using exponentiation ; Fermat's little theorem ; Decrypting using exponentiation ; The discrete logarithm problem ; Composite moduli ; The Euler Phi function ; Decryption with composite moduli ; Looking forward -- Public-key ciphers. Right out in public: the idea of public-key ciphers ; Diffie-Hellman key agreement ; Asymmetric-key cryptography ; RSA ; Priming the pump: primality testing ; Why is RSA a (Good) public-key system? ; Cryptanalysis of RSA ; Looking forward -- Other public-key systems. The three-pass protocol ; ElGamal ; Elliptic curve cryptography ; Digital signatures ; Looking forward -- The future of cryptography. Quantum computing ; Postquantum cryptogaphy ; Quantum cryptography ; Looking forward. |
Note |
In English. |
ISBN |
1400885620 (ebk) |
|
9781400885626 |
|
9780691184555 (electronic book) |
|
0691184550 (electronic book) |
|
0691141754 |
|
9780691141756 |
Standard # |
10.1515/9781400885626 doi |
Standard no. |
99974545040 |
|